Server Component Details | End Points used |
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/configuration
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/{issuerId}/well-known-proxy
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/identity/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/binding-otp
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/publish
Domain: api-internal.released.mosip.net ---- Module: idgenerator ---- End Point: v1/idgenerator/uin
Domain: api-internal.released.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/Mosip
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/identity/
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/send-otp
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/credentials/download
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/actuator/env
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallet-binding
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/idschema/latest
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/actuator/env
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/vid
Domain: api-internal.released.mosip.net ---- Module: idauthentication ---- End Point: idauthentication/v1/actuator/env
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/invalid
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/verifiers
Domain: api-internal.released.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/Mosip/configuration | ||||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
| Mimoto Pre-requisite API Test ---- Report Date: 2025-06-13 ---- Tested Environment: qa-inji1 ---- Commit Id is: bb2774c2 & Branch Name is:release-0.17.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| Adding Identity | 3 | 3 | 0 | 0 | 0 | 0 | 00:01:36 | |
| GenerateVID | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:00 | |
| CreateVID | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Mimoto API Test ---- Report Date: 2025-06-13 ---- Tested Environment: qa-inji1 ---- Commit Id is: bb2774c2 & Branch Name is:release-0.17.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| CreatePolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetPolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| SearchPolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| OAuthDetailsRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| AuthenticateUser | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthorizationCode | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| OAuthDetailsRequestSunBirdC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| AuthenticateUserSunBirdC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| AuthorizationCodeSunBirdC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DownloadIssuerCredential | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:13 | |
| AuthLock | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:00 | |
| AuthUnLock | 4 | 0 | 0 | 0 | 4 | 0 | 00:00:00 | |
| RequestCredentials | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:00 | |
| CredentialCheckStatus | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:00 | |
| DownloadCredential | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:00 | |
| SendOTP | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:00 | |
| AidGetIndividualId | 5 | 0 | 0 | 0 | 5 | 0 | 00:00:00 | |
| BindingOtp | 36 | 36 | 0 | 0 | 0 | 0 | 00:00:05 | |
| WalletBinding | 78 | 78 | 0 | 0 | 0 | 0 | 00:03:40 | |
| GetAllIssuers | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetIssuerWellKnown | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeletePolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetVerifierList | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetIssuerConfiguration | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| Total | 176 | 143 | 0 | 0 | 33 | 0 | 00:05:40 | |
| TestCase Number | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|
| Adding Identity — Passed | ||
| TC_Mimoto_AddIdentity_02 | Creating a new identity with all valid parameters for Binding APIs | 00:00:01 |
| TC_Mimoto_AddIdentity_03 | Creating a new identity for downloading issuer credential | 00:00:01 |
| TC_Mimoto_AddIdentity_01 | Creating a new identity with all valid parameters | 00:00:03 |
| GenerateVID — Ignored | ||
| TC_Mimoto_GenerateVID_06 | Creating perpetual VID with binding valid request | 00:00:00 |
| TC_Mimoto_GenerateVID_02 | Creating Perpetual VID with invalid OTP | 00:00:00 |
| TC_Mimoto_GenerateVID_05 | Creating perpetual VID with invalid transactionID | 00:00:00 |
| TC_Mimoto_GenerateVID_01 | Creating Perpetual VID with all valid parameters | 00:00:00 |
| TC_Mimoto_GenerateVID_03 | Creating Perpetual VID with invalid UIN | 00:00:00 |
| TC_Mimoto_GenerateVID_04 | Creating temporary VID with all valid request | 00:00:00 |
| CreateVID — Passed | ||
| TC_Mimoto_GenerateVID_06 | Create perpetual VID for binding with valid details | 00:00:00 |
| TC_Mimoto_GenerateVID_01 | Create perpetual VID with valid details | 00:00:00 |
| TC_Mimoto_GenerateVID_04 | Create temporary VID with valid details | 00:00:00 |
| CreatePolicySunBirdR — Passed | ||
| TC_Mimoto_CreatePolicySunBirdR_01 | Creating new sunbird policy with valid parameters | 00:00:00 |
| GetPolicySunBirdR — Passed | ||
| TC_Mimoto_GetPolicySunBirdR_01 | Getting sunbird policy with valid parameters | 00:00:00 |
| SearchPolicySunBirdR — Passed | ||
| TC_Mimoto_SearchPolicySunBirdR_01 | Searching sunbird policy with valid parameters | 00:00:00 |
| OAuthDetailsRequest — Passed | ||
| TC_Mimoto_OAuthDetailsRequest_01 | Creating Oauth's details with all valid parameters | 00:00:00 |
| AuthenticateUser — Passed | ||
| TC_Mimoto_AuthenticateUser_01 | Authenticate user to download credentials with all valid parameters | 00:00:01 |
| AuthorizationCode — Passed | ||
| TC_Mimoto_AuthorizationCode_01 | Generate authorization code to download credential issuer | 00:00:00 |
| OAuthDetailsRequestSunBirdC — Passed | ||
| TC_Mimoto_OAuthDetailsRequestSunBirdC_01 | Getting auth details for downloading sunbird credentials | 00:00:00 |
| AuthenticateUserSunBirdC — Passed | ||
| TC_Mimoto_AuthenticateUserSunBirdC_01 | Authenticating user for downloading sunbird credential | 00:00:00 |
| AuthorizationCodeSunBirdC — Passed | ||
| TC_Mimoto_AuthorizationCodeSunBirdC_01 | Generating authorization code for downloading sunbird VC | 00:00:00 |
| DownloadIssuerCredential — Passed | ||
| TC_Mimoto_DownloadIssuerCredential_04 | Downloading credential with invalid credential AuthorizationCode | 00:00:00 |
| TC_Mimoto_DownloadIssuerCredential_03 | Downloading credential with invalid credential | 00:00:00 |
| TC_Mimoto_DownloadIssuerCredential_02 | Downloading credential with invalid issuer | 00:00:00 |
| TC_Mimoto_DownloadIssuerCredential_01 | Downloading credential with all valid parameters | 00:00:05 |
| TC_Mimoto_DownloadIssuerCredential_06 | Downloading sunbird credential with valid authorizationCode | 00:00:06 |
| TC_Mimoto_DownloadIssuerCredential_05 | Downloading credential with invalid expired authorizationCode | 00:00:00 |
| AuthLock — Ignored | ||
| TC_Mimoto_AuthLock_02 | Auth Lock a particular UIN with invalid OTP | 00:00:00 |
| TC_Mimoto_AuthLock_01 | Auth lock a particular UIN with valid parameters | 00:00:00 |
| TC_Mimoto_AuthLock_04 | Auth lock a particular VID with valid VID | 00:00:00 |
| TC_Mimoto_AuthLock_06 | Auth lock a particular VID with invalid VID | 00:00:00 |
| TC_Mimoto_AuthLock_03 | Auth Lock a particular UIN with valid OTP | 00:00:00 |
| TC_Mimoto_AuthLock_05 | Auth lock a particular VID with invalid OTP | 00:00:00 |
| AuthUnLock — Ignored | ||
| TC_Mimoto_AuthLock_10 | Unlock a particular VID with invalid OTP | 00:00:00 |
| TC_Mimoto_AuthLock_07 | Auth unlock a particular UIN with valid parameters | 00:00:00 |
| TC_Mimoto_AuthLock_08 | Auth unlock a particular VID with valid parameters | 00:00:00 |
| TC_Mimoto_AuthLock_09 | Auth unlock a particular UIN with invalid OTP | 00:00:00 |
| RequestCredentials — Ignored | ||
| TC_Mimoto_RequestCredentials_02 | requesting credential with valid VID | 00:00:00 |
| TC_Mimoto_RequestCredentials_03 | requesting UIN credential with invalid OTP | 00:00:00 |
| TC_Mimoto_RequestCredentials_04 | requesting credential with invalid transactionID | 00:00:00 |
| TC_Mimoto_RequestCredentials_05 | requesting credential with invalid UIN | 00:00:00 |
| TC_Mimoto_RequestCredentials_06 | requesting credential with invalid VID | 00:00:00 |
| TC_Mimoto_RequestCredentials_01 | requesting credential with all valid parameters | 00:00:00 |
| CredentialCheckStatus — Ignored | ||
| TC_Mimoto_CredentialsStatus_01 | Retrieving credential status with valid UIN | 00:00:00 |
| TC_Mimoto_CreateVID_03 | Retrieving credential status with invalid requestId | 00:00:00 |
| TC_Mimoto_CredentialsStatus_02 | Retrieving credential status with valid VID | 00:00:00 |
| DownloadCredential — Ignored | ||
| TC_Mimoto_DownloadCredential_01 | Checking credential status with all valid parameters | 00:00:00 |
| TC_Mimoto_DownloadCredential_02 | Checking credential status with invalid StatusCode | 00:00:00 |
| SendOTP — Ignored | ||
| TC_Mimoto_individualOTP_01 | generating individual OTP with valid parameters | 00:00:00 |
| AidGetIndividualId — Ignored | ||
| TC_Mimoto_AidGetIndividualId_02 | Generating individualID with invalid AID | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_03 | Generating individualID with Invalid OTP | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_05 | Generating individualID with invalid lengh of AID | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_04 | Generating individualID with valid OTP | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_01 | Generating AID status with valid AID | 00:00:00 |
| BindingOtp — Passed | ||
| TC_Mimoto_BindingOtp_13 | Creating OTP for binding a individualID with OTP channel being empty | 00:00:00 |
| TC_Mimoto_BindingOtp_10 | Creating OTP for binding a individualID with OTP channel being empty | 00:00:00 |
| TC_Mimoto_BindingOtp_19 | Creating OTP for binding a individualID with empty request time | 00:00:00 |
| TC_Mimoto_BindingOtp_05 | Creating OTP for binding a individualID with individualId missing | 00:00:00 |
| TC_Mimoto_BindingOtp_17 | Creating OTP for binding a individualID with future request time | 00:00:00 |
| TC_Mimoto_BindingOtp_08 | Creating OTP for binding a individualID with invalid OTP channel | 00:00:00 |
| TC_Mimoto_AuthLock_07 | Creating OTP for binding a individualID with invalid request time | 00:00:00 |
| TC_Mimoto_BindingOtp_03 | Creating OTP for binding a individualID with invalid UIN | 00:00:00 |
| TC_Mimoto_BindingOtp_12 | Creating OTP for binding a individualID with OTP channel missing | 00:00:00 |
| TC_Mimoto_BindingOtp_09 | Creating OTP for binding a individualID with OTP channel missing | 00:00:00 |
| TC_Mimoto_BindingOtp_18 | Creating OTP for binding a individualID with missing request time | 00:00:00 |
| TC_Mimoto_BindingOtp_04 | Creating OTP for binding a individualID without individualId attribute | 00:00:00 |
| TC_Mimoto_BindingOtp_14 | Creating OTP for binding a individualID with OTP channel being empty | 00:00:00 |
| TC_Mimoto_BindingOtp_11 | Creating OTP for binding a individualID with OTP channel value being null | 00:00:00 |
| TC_Mimoto_BindingOtp_06 | Creating OTP for binding a individualID with individualId value as null | 00:00:00 |
| TC_Mimoto_BindingOtp_16 | Creating OTP for binding a individualID with past request time | 00:00:00 |
| TC_Mimoto_BindingOtp_07 | Creating OTP for binding a individualID with OTP channel value been spaced in between | 00:00:00 |
| TC_Mimoto_BindingOtp_01 | Creating OTP for binding a individualID with valid UIN | 00:00:01 |
| TC_Mimoto_BindingOtp_02 | Creating OTP for binding a individualID with valid VID | 00:00:01 |
| TC_Mimoto_BindingOtp_30 | Creating OTP for binding a VID with OTP channel values empty | 00:00:00 |
| TC_Mimoto_BindingOtp_27 | Creating OTP for binding a VID with empty OTP channel values | 00:00:00 |
| TC_Mimoto_BindingOtp_36 | Creating OTP for binding a VID with request time empty | 00:00:00 |
| TC_Mimoto_BindingOtp_22 | Creating OTP for binding a individualID with empty VID | 00:00:00 |
| TC_Mimoto_BindingOtp_34 | Creating OTP for binding a VID with future request time | 00:00:00 |
| TC_Mimoto_BindingOtp_25 | Creating OTP for binding a VID with invalid OTP channel | 00:00:00 |
| TC_Mimoto_BindingOtp_32 | Creating OTP for binding a VID with invalid request time | 00:00:00 |
| TC_Mimoto_BindingOtp_20 | Creating OTP for binding a individualID with invalid VID | 00:00:00 |
| TC_Mimoto_BindingOtp_29 | Creating OTP for binding a VID with OTP channel values missing | 00:00:00 |
| TC_Mimoto_BindingOtp_26 | Creating OTP for binding a VID with missing OTP channel values | 00:00:00 |
| TC_Mimoto_BindingOtp_35 | Creating OTP for binding a VID with request time missing | 00:00:00 |
| TC_Mimoto_BindingOtp_21 | Creating OTP for binding a individualID with missing VID | 00:00:00 |
| TC_Mimoto_BindingOtp_31 | Creating OTP for binding a VID with OTP channel values as null | 00:00:00 |
| TC_Mimoto_BindingOtp_28 | Creating OTP for binding a VID with OTP channel values as null | 00:00:00 |
| TC_Mimoto_BindingOtp_23 | Creating OTP for binding a individualID with invalid VID | 00:00:00 |
| TC_Mimoto_BindingOtp_33 | Creating OTP for binding a VID with past request time | 00:00:00 |
| TC_Mimoto_BindingOtp_24 | Creating OTP for binding a VID with OTP channel value been spaced in between | 00:00:00 |
| WalletBinding — Passed | ||
| TC_Mimoto_WalletBinding_14 | Generating OTP to bind VC with empty authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_20 | Generating OTP to bind VC with empty challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_25 | Generating OTP to bind VC with empty formate | 00:00:00 |
| TC_Mimoto_WalletBinding_09 | Generating OTP to bind VC with empty individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_06 | Generating OTP to bind VC with empty requestime | 00:00:01 |
| TC_Mimoto_WalletBinding_30 | Generating OTP to bind VC with empty authFactorType1 | 00:00:00 |
| TC_Mimoto_WalletBinding_35 | Generating OTP to bind VC with empty format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_05 | Generating OTP to bind VC with future request time | 00:00:01 |
| TC_Mimoto_WalletBinding_13 | Generating OTP to bind VC with invalid authfactortype | 00:00:00 |
| TC_Mimoto_WalletBinding_18 | Generating OTP to bind VC with invalid challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_23 | Generating OTP to bind VC with invalid formate | 00:00:01 |
| TC_Mimoto_WalletBinding_08 | Generating OTP to bind VC with invalid individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_03 | Generating OTP to bind VC with invalid request time | 00:00:01 |
| TC_Mimoto_WalletBinding_28 | Generating OTP to bind VC with invalid authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_33 | Generating OTP to bind VC with invalid format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_38 | Generating OTP to bind VC with invalid publickey | 00:00:11 |
| TC_Mimoto_WalletBinding_15 | Generating OTP to bind VC with missing authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_19 | Generating OTP to bind VC with missing challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_24 | Generating OTP to bind VC with missing formate | 00:00:01 |
| TC_Mimoto_WalletBinding_11 | Generating OTP to bind VC with individualId being missing | 00:00:10 |
| TC_Mimoto_WalletBinding_07 | Generating OTP to bind VC with missing requestime | 00:00:00 |
| TC_Mimoto_WalletBinding_29 | Generating OTP to bind VC with missing authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_34 | Generating OTP to bind VC with missing format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_40 | Generating OTP to bind VC with missing publickey | 00:00:10 |
| TC_Mimoto_WalletBinding_17 | Generating OTP to bind VC with authfactortype value being just null | 00:00:01 |
| TC_Mimoto_WalletBinding_22 | Generating OTP to bind VC with challenge value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_27 | Generating OTP to bind VC with formate value having null | 00:00:00 |
| TC_Mimoto_WalletBinding_10 | Generating OTP to bind VC with individualId being null | 00:00:01 |
| TC_Mimoto_WalletBinding_32 | Generating OTP to bind VC with authFactorType1 value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_37 | Generating OTP to bind VC with format1 value having null | 00:00:11 |
| TC_Mimoto_WalletBinding_39 | Generating OTP to bind VC with null as publickey | 00:00:11 |
| TC_Mimoto_WalletBinding_01 | Generating OTP to bind VC with valid UIN | 00:00:02 |
| TC_Mimoto_WalletBinding_04 | Generating OTP to bind VC with past request time | 00:00:01 |
| TC_Mimoto_WalletBinding_16 | Generating OTP to bind VC with authfactortype value being just space | 00:00:01 |
| TC_Mimoto_WalletBinding_21 | Generating OTP to bind VC with challenge value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_26 | Generating OTP to bind VC with formate value having space | 00:00:00 |
| TC_Mimoto_WalletBinding_12 | Generating OTP to bind VC with individualId value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_31 | Generating OTP to bind VC with authFactorType1 value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_36 | Generating OTP to bind VC with format1 value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_52 | Generating OTP to bind VID VC with empty authfactortype | 00:00:10 |
| TC_Mimoto_WalletBinding_58 | Generating OTP to bind VID VC with empty challenge | 00:00:00 |
| TC_Mimoto_WalletBinding_63 | Generating OTP to bind VID VC with empty formate | 00:00:00 |
| TC_Mimoto_WalletBinding_47 | Generating OTP to bind vid VC with empty individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_44 | Generating OTP to bind vid VC with empty request time | 00:00:01 |
| TC_Mimoto_WalletBinding_68 | Generating OTP to bind VID VC with empty authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_73 | Generating OTP to bind VID VC with empty format1 | 00:00:00 |
| TC_Mimoto_WalletBinding_43 | Generating OTP to bind vid VC with future request time | 00:00:01 |
| TC_Mimoto_WalletBinding_51 | Generating OTP to bind VID VC with invalid authfactortype | 00:00:10 |
| TC_Mimoto_WalletBinding_56 | Generating OTP to bind VID VC with invalid challenge | 00:00:00 |
| TC_Mimoto_WalletBinding_61 | Generating OTP to bind VID VC with invalid formate | 00:00:00 |
| TC_Mimoto_WalletBinding_46 | Generating OTP to bind vid VC with invalid individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_41 | Generating OTP to bind vid VC with invalid request time | 00:00:11 |
| TC_Mimoto_WalletBinding_66 | Generating OTP to bind VID VC with invalid authFactorType1 | 00:00:11 |
| TC_Mimoto_WalletBinding_71 | Generating OTP to bind VID VC with invalid format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_76 | Generating OTP to bind VID VC with invalid publickey | 00:00:10 |
| TC_Mimoto_WalletBinding_53 | Generating OTP to bind VID VC with missing authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_57 | Generating OTP to bind VID VC with missing challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_62 | Generating OTP to bind VID VC with missing formate | 00:00:01 |
| TC_Mimoto_WalletBinding_49 | Generating OTP to bind vid VC with missing individualId | 00:00:00 |
| TC_Mimoto_WalletBinding_45 | Generating OTP to bind vid VC with missing request time | 00:00:01 |
| TC_Mimoto_WalletBinding_67 | Generating OTP to bind VID VC with missing authFactorType1 | 00:00:00 |
| TC_Mimoto_WalletBinding_72 | Generating OTP to bind VID VC with missing format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_78 | Generating OTP to bind VID VC with missing publickey | 00:00:11 |
| TC_Mimoto_WalletBinding_55 | Generating OTP to bind VID VC with authfactortype value being just null | 00:00:01 |
| TC_Mimoto_WalletBinding_60 | Generating OTP to bind VID VC with challenge value having null | 00:00:00 |
| TC_Mimoto_WalletBinding_65 | Generating OTP to bind VID VC with formate value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_48 | Generating OTP to bind vid VC with null individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_70 | Generating OTP to bind VID VC with authFactorType1 value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_75 | Generating OTP to bind VID VC with format1 value having null | 00:00:00 |
| TC_Mimoto_WalletBinding_77 | Generating OTP to bind VID VC with null as publickey | 00:00:10 |
| TC_Mimoto_WalletBinding_02 | Generating OTP to bind VC with valid VID | 00:00:02 |
| TC_Mimoto_WalletBinding_42 | Generating OTP to bind vid VC with past request time | 00:00:01 |
| TC_Mimoto_WalletBinding_54 | Generating OTP to bind VID VC with authfactortype value being just space | 00:00:01 |
| TC_Mimoto_WalletBinding_59 | Generating OTP to bind VID VC with challenge value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_64 | Generating OTP to bind VID VC with formate value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_50 | Generating OTP to bind VID VC with individualId value having space | 00:00:00 |
| TC_Mimoto_WalletBinding_69 | Generating OTP to bind VID VC with authFactorType1 value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_74 | Generating OTP to bind VID VC with format1 value having space | 00:00:01 |
| GetAllIssuers — Passed | ||
| TC_Mimoto_GetAllIssuers_01 | Retrieving issuers with all valid parameters | 00:00:00 |
| TC_Mimoto_GetAllIssuers_03 | Retrieving invalid issuer | 00:00:00 |
| TC_Mimoto_GetAllIssuers_02 | Retrieving all specific issuer with all valid parameters | 00:00:00 |
| GetIssuerWellKnown — Passed | ||
| Mimoto_GetIssuerWellKnown_All_Valid_Smoke | Generating the issuer well known with all valid parameters | 00:00:00 |
| DeletePolicySunBirdR — Passed | ||
| TC_Mimoto_DeletePolicySunBirdR_01 | Deleting Sunbird policy with valid parameters | 00:00:00 |
| GetVerifierList — Passed | ||
| TC_Mimoto_GetVerifierList_01 | Retrieving verifiers list with all valid parameters | 00:00:00 |
| GetIssuerConfiguration — Passed | ||
| TC_Mimoto_GetIssuerConfiguration_01 | Retrieving verifiers list with all valid parameters | 00:00:00 |
| TC_Mimoto_GetIssuerConfiguration_02 | Retrieving verifiers list with invalid URL | 00:00:00 |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_Binding_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_Binding_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"},{"language":"khm","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"},{"language":"khm","value":"TEST_CITYkhm"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"},{"language":"khm","value":"TEST_FULLNAMEkhm"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"},{"language":"khm","value":"TEST_PROVINCEkhm"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"},{"language":"khm","value":"TEST_ZONEkhm"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"},{"language":"khm","value":"TEST_ADDRESSLINE1khm"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"},{"language":"khm","value":"TEST_ADDRESSLINE2khm"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"},{"language":"khm","value":"TEST_ADDRESSLINE3khm"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"},{"language":"khm","value":"TEST_REGIONkhm"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity with all valid parameters for Binding APIs, uniqueIdentifier=TC_Mimoto_AddIdentity_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"},{"language":"khm","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"},{"language":"khm","value":"TEST_CITYkhm"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"},{"language":"khm","value":"TEST_FULLNAMEkhm"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"},{"language":"khm","value":"TEST_PROVINCEkhm"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"},{"language":"khm","value":"TEST_ZONEkhm"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"},{"language":"khm","value":"TEST_ADDRESSLINE1khm"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"},{"language":"khm","value":"TEST_ADDRESSLINE2khm"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"},{"language":"khm","value":"TEST_ADDRESSLINE3khm"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"},{"language":"khm","value":"TEST_REGIONkhm"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity for downloading issuer credential, uniqueIdentifier=TC_Mimoto_AddIdentity_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_withValidParameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_withValidParameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"},{"language":"khm","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"},{"language":"khm","value":"TEST_CITYkhm"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"},{"language":"khm","value":"TEST_FULLNAMEkhm"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"},{"language":"khm","value":"TEST_PROVINCEkhm"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"},{"language":"khm","value":"TEST_ZONEkhm"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"},{"language":"khm","value":"TEST_ADDRESSLINE1khm"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"},{"language":"khm","value":"TEST_ADDRESSLINE2khm"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"},{"language":"khm","value":"TEST_ADDRESSLINE3khm"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"},{"language":"khm","value":"TEST_REGIONkhm"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity with all valid parameters, uniqueIdentifier=TC_Mimoto_AddIdentity_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating perpetual VID with binding valid request, uniqueIdentifier=TC_Mimoto_GenerateVID_06 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_InValid_Otp_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "112637338", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with invalid OTP, uniqueIdentifier=TC_Mimoto_GenerateVID_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Invalid_TransactionId_Neg, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$trc45", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating perpetual VID with invalid transactionID, uniqueIdentifier=TC_Mimoto_GenerateVID_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with all valid parameters, uniqueIdentifier=TC_Mimoto_GenerateVID_01 |
| Messages |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_with_InvalidUIN_Valid_Otp_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "253SDGSH@Y37", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with invalid UIN, uniqueIdentifier=TC_Mimoto_GenerateVID_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=mimoto_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Temporary", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating temporary VID with all valid request, uniqueIdentifier=TC_Mimoto_GenerateVID_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Output Validation Exception |
|---|
org.testng.TestNGException:
Native Injection is NOT supported for @AfterSuite annotated testTearDown.
For more information on native dependency injection please refer to https://testng.org/#_dependency_injection
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 14 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create perpetual VID for binding with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create perpetual VID with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create temporary VID with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid, endPoint=/api/v1/Insurance, role=resident, templateFields=null, input={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$", "policyName": "Start Insurance Gold Premium", "policyExpiresOn": "2033-04-20T20:48:17.684Z", "policyIssuedOn": "$TIMESTAMP$", "fullName" : "$FULLNAMEFORSUNBIRDRC$", "dob" : "$DOBFORSUNBIRDRC$", "benefits": [{"benefits": "Critical Surgery"}, {"benefits": "Full body checkup"}], "gender": "Male", "mobile": "0123456789", "email": "abhishek@gmail.com" }, output={ "status": "SUCCESSFUL" }, inputTemplate=mimoto/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR, outputTemplate=mimoto/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_CreatePolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, inputTemplate=mimoto/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR, outputTemplate=mimoto/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_GetPolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/search, role=resident, templateFields=null, input={ "offset": "0", "limit": "5", "fullName": "$FULLNAMEFORSUNBIRDRC$", "dob": "$DOBFORSUNBIRDRC$", "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, output={ }, inputTemplate=mimoto/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR, outputTemplate=mimoto/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Searching sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_SearchPolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequest_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=mimoto/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters, uniqueIdentifier=TC_Mimoto_AuthenticateUser_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=mimoto/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer, uniqueIdentifier=TC_Mimoto_AuthorizationCode_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading sunbird credentials, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUser_SunBirdC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading sunbird credential, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading sunbird VC, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Invalid_AuthorizationCode_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "XjIsJgQAX3lrhMmXgRn-jerNMCqf0GdiBLx5MbMig", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MosipVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential AuthorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Invalid_Credential_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredentialInvalid" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Invalid_Issuer_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "MosipInvalid", "credential": "MosipVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid issuer, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_IssuerMosip_All_Valid_Smoke, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MosipVerifiableCredential" }, output={ }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_IssuerSunBird_All_Valid_Smoke, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credential": "InsuranceCredential" }, output={ }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Reused_AuthorizationCode_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MosipVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid expired authorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_InValid_Otp_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "111sss@@1", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth Lock a particular UIN with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_Valid_UIN_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/AuthLock/createAuthLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular UIN with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_Valid_VID_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/AuthLock/createAuthLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with valid VID, uniqueIdentifier=TC_Mimoto_AuthLock_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_invalidVID_Valid_Otp, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "36363gvb", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with invalid VID, uniqueIdentifier=TC_Mimoto_AuthLock_06 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_with_invalidUIN_Valid_Otp_sid, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "263738@@#FDCVvb", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth Lock a particular UIN with valid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_with_invalidVID_Valid_Otp, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "26DBDB@73", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_InValid_OTP_With_VID_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "11111@@###1", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock a particular VID with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_10 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_Valid_UIN_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/AuthUnLock/createAuthUnLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular UIN with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_07 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_Valid_UIN_With_VID_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/AuthUnLock/createAuthUnLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular VID with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_08 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_With_InValid_OTP_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "111@@@###hhdhdh111", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular UIN with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_09 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_All_Valid_Smoke_with_VID_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "id": "$IGNORE$", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/CredentialIssuance/RequestCredentials/ReqCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with valid VID, uniqueIdentifier=TC_Mimoto_RequestCredentials_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_InValid_Otp_UIN_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "4h4hnn", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting UIN credential with invalid OTP, uniqueIdentifier=TC_Mimoto_RequestCredentials_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_InValid_TransactionId_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "4dhn@@##&%", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid transactionID, uniqueIdentifier=TC_Mimoto_RequestCredentials_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_InValid_UIN_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ght56=", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid UIN, uniqueIdentifier=TC_Mimoto_RequestCredentials_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_Invalid_VID_sid_Neg, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$hfg56", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid VID, uniqueIdentifier=TC_Mimoto_RequestCredentials_06 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials__All_Valid_Smoke_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "id": "$IGNORE$", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/CredentialIssuance/RequestCredentials/ReqCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with all valid parameters, uniqueIdentifier=TC_Mimoto_RequestCredentials_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:99)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_euin_All_Valid_Smoke, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$" }, output={ "statusCode": "ISSUED" }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatusResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with valid UIN, uniqueIdentifier=TC_Mimoto_CredentialsStatus_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_euin_With_Invalid_RequestId_Neg, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$er45" }, output={ "errors": [ { "errorCode": "RES-SER-29" } ] }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with invalid requestId, uniqueIdentifier=TC_Mimoto_CreateVID_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_euin_With_VID_All_Valid_Smoke, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials_All_Valid_Smoke_with_VID_sid_requestId$" }, output={ "statusCode": "ISSUED" }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatusResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with valid VID, uniqueIdentifier=TC_Mimoto_CredentialsStatus_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_All_Valid_Smoke_euin, endPoint=/v1/mimoto/credentialshare/download, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$" }, output= { "Content-Type": "application/pdf" }, inputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqid, outputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqidResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking credential status with all valid parameters, uniqueIdentifier=TC_Mimoto_DownloadCredential_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_StatusCode_InValid_Smoke_euin, endPoint=/v1/mimoto/credentialshare/download, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$", "individualId": "965337484848041697" }, output=404, inputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqid, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking credential status with invalid StatusCode, uniqueIdentifier=TC_Mimoto_DownloadCredential_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_individualOTP_All_Valid_Smoke, endPoint=/v1/mimoto/req/individualId/otp, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$" }, output={ }, inputTemplate=mimoto/SendOTPUIN/individualIdOtp, outputTemplate=mimoto/SendOTPUIN/individualIdOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=generating individual OTP with valid parameters, uniqueIdentifier=TC_Mimoto_individualOTP_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_AID_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$yt55g", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with invalid AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_Otp_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "1234", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with Invalid OTP, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_lenght_Of_AID_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "2745538921628455389216202302041241544770230204124154278477", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-457" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with invalid lengh of AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Valid_Otp_All, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "aidStatus": "PROCESSED", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/AidGetIndividualId/aidGetIndividualIdResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with valid OTP, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Valid_UIN_All, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "aidStatus": "PROCESSED", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/AidGetIndividualId/aidGetIndividualIdResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating AID status with valid AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:95)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:95)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with empty request time, uniqueIdentifier=TC_Mimoto_BindingOtp_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with individualId missing, uniqueIdentifier=TC_Mimoto_BindingOtp_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Future_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with future request time, uniqueIdentifier=TC_Mimoto_BindingOtp_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Invalid_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "sdsgsg"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid OTP channel, uniqueIdentifier=TC_Mimoto_BindingOtp_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid request time, uniqueIdentifier=TC_Mimoto_AuthLock_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Invalid_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "@#DSDFD@#", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid UIN, uniqueIdentifier=TC_Mimoto_BindingOtp_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "$IGNORE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel missing, uniqueIdentifier=TC_Mimoto_BindingOtp_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "$IGNORE$"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel missing, uniqueIdentifier=TC_Mimoto_BindingOtp_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$IGNORE$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with missing request time, uniqueIdentifier=TC_Mimoto_BindingOtp_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID without individualId attribute, uniqueIdentifier=TC_Mimoto_BindingOtp_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Null_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Null_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "null"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel value being null, uniqueIdentifier=TC_Mimoto_BindingOtp_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Null_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with individualId value as null, uniqueIdentifier=TC_Mimoto_BindingOtp_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Past_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with past request time, uniqueIdentifier=TC_Mimoto_BindingOtp_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_SpaceSeparated_otpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "E M A I L"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel value been spaced in between, uniqueIdentifier=TC_Mimoto_BindingOtp_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_Valid_UIN_All_Smoke, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "maskedMobile": "$IGNORE$" }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/BindingOtp/BindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with valid UIN, uniqueIdentifier=TC_Mimoto_BindingOtp_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_Valid_vid_All_Smoke, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "maskedMobile": "$IGNORE$" }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/BindingOtp/BindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with valid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values empty, uniqueIdentifier=TC_Mimoto_BindingOtp_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with empty OTP channel values, uniqueIdentifier=TC_Mimoto_BindingOtp_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with request time empty, uniqueIdentifier=TC_Mimoto_BindingOtp_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with empty VID, uniqueIdentifier=TC_Mimoto_BindingOtp_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Future_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with future request time, uniqueIdentifier=TC_Mimoto_BindingOtp_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Invalid_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "sdsgsg"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with invalid OTP channel, uniqueIdentifier=TC_Mimoto_BindingOtp_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with invalid request time, uniqueIdentifier=TC_Mimoto_BindingOtp_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Invalid_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "@#DSDFD@#", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "$IGNORE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values missing, uniqueIdentifier=TC_Mimoto_BindingOtp_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "$IGNORE$"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with missing OTP channel values, uniqueIdentifier=TC_Mimoto_BindingOtp_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$IGNORE$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with request time missing, uniqueIdentifier=TC_Mimoto_BindingOtp_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with missing VID, uniqueIdentifier=TC_Mimoto_BindingOtp_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Null_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values as null, uniqueIdentifier=TC_Mimoto_BindingOtp_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Null_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "null"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values as null, uniqueIdentifier=TC_Mimoto_BindingOtp_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Null_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Past_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with past request time, uniqueIdentifier=TC_Mimoto_BindingOtp_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_SpaceSeparated_otpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "E M A I L"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel value been spaced in between, uniqueIdentifier=TC_Mimoto_BindingOtp_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with empty authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with empty challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with empty formate, uniqueIdentifier=TC_Mimoto_WalletBinding_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty requestime, uniqueIdentifier=TC_Mimoto_WalletBinding_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty format1, uniqueIdentifier=TC_Mimoto_WalletBinding_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_FutureVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with future request time, uniqueIdentifier=TC_Mimoto_WalletBinding_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with invalid authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with invalid challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with invalid formate, uniqueIdentifier=TC_Mimoto_WalletBinding_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind VC with invalid individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "asdf$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid request time, uniqueIdentifier=TC_Mimoto_WalletBinding_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid format1, uniqueIdentifier=TC_Mimoto_WalletBinding_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_38 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with missing authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with missing challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with missing formate, uniqueIdentifier=TC_Mimoto_WalletBinding_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with individualId being missing, uniqueIdentifier=TC_Mimoto_WalletBinding_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing requestime, uniqueIdentifier=TC_Mimoto_WalletBinding_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing format1, uniqueIdentifier=TC_Mimoto_WalletBinding_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$REMOVE$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_40 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "null", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with authfactortype value being just null, uniqueIdentifier=TC_Mimoto_WalletBinding_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "null", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with challenge value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "null", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with formate value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind VC with individualId being null, uniqueIdentifier=TC_Mimoto_WalletBinding_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "null", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with authFactorType1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "null", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with format1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_37 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with null as publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_39 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_OTP_Valid_Smoke, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with valid UIN, uniqueIdentifier=TC_Mimoto_WalletBinding_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_PastVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with past request time, uniqueIdentifier=TC_Mimoto_WalletBinding_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with authfactortype value being just space, uniqueIdentifier=TC_Mimoto_WalletBinding_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with challenge value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with formate value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with individualId value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with authFactorType1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with format1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with empty authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_52 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with empty challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_58 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with empty formate, uniqueIdentifier=TC_Mimoto_WalletBinding_63 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with empty individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_47 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with empty request time, uniqueIdentifier=TC_Mimoto_WalletBinding_44 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with empty authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_68 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with empty format1, uniqueIdentifier=TC_Mimoto_WalletBinding_73 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_FutureVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with future request time, uniqueIdentifier=TC_Mimoto_WalletBinding_43 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with invalid authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_51 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with invalid challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_56 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid formate, uniqueIdentifier=TC_Mimoto_WalletBinding_61 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind vid VC with invalid individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_46 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "asdf$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with invalid request time, uniqueIdentifier=TC_Mimoto_WalletBinding_41 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_66 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid format1, uniqueIdentifier=TC_Mimoto_WalletBinding_71 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_76 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with missing authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_53 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with missing challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_57 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with missing formate, uniqueIdentifier=TC_Mimoto_WalletBinding_62 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with missing individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_49 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with missing request time, uniqueIdentifier=TC_Mimoto_WalletBinding_45 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_67 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing format1, uniqueIdentifier=TC_Mimoto_WalletBinding_72 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$REMOVE$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_78 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "null", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authfactortype value being just null, uniqueIdentifier=TC_Mimoto_WalletBinding_55 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "null", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with challenge value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_60 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "null", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with formate value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_65 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind vid VC with null individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_48 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "null", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authFactorType1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_70 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "null", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with format1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_75 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with null as publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_77 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_OTP_Valid_Smoke, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with valid VID, uniqueIdentifier=TC_Mimoto_WalletBinding_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_PastVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with past request time, uniqueIdentifier=TC_Mimoto_WalletBinding_42 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with authfactortype value being just space, uniqueIdentifier=TC_Mimoto_WalletBinding_54 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with challenge value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_59 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with formate value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_64 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with individualId value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_50 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authFactorType1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_69 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with format1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_74 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetAllIssuers_All_Valid_Smoke, endPoint=/v1/mimoto/issuers, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/GetAllIssuers/GetAllIssuersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving issuers with all valid parameters, uniqueIdentifier=TC_Mimoto_GetAllIssuers_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetAllIssuers_Invalid_Issuer_Neg, endPoint=/v1/mimoto/issuers/invalid, role=resident, templateFields=null, input={ }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving invalid issuer, uniqueIdentifier=TC_Mimoto_GetAllIssuers_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetAllIssuers_Specific_Issuer_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/Mosip, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/GetAllIssuers/GetAllIssuersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all specific issuer with all valid parameters, uniqueIdentifier=TC_Mimoto_GetAllIssuers_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetIssuerWellKnown_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/{issuerId}/well-known-proxy, role=resident, templateFields=null, input={ "issuerId": "Mosip", "credentialType": "$REMOVE$" }, output={ }, inputTemplate=mimoto/GetIssuerWellKnown/GetIssuerWellKnown, outputTemplate=mimoto/GetIssuerWellKnown/GetIssuerWellKnownResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating the issuer well known with all valid parameters, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "status": "SUCCESSFUL" }, inputTemplate=mimoto/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR, outputTemplate=mimoto/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult, restMethod=delete, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deleting Sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_DeletePolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetVerifierList_All_Valid_Smoke, endPoint=/v1/mimoto/verifiers, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetVerifierList/GetVerifierList, outputTemplate=mimoto/GetVerifierList/GetVerifierListResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with all valid parameters, uniqueIdentifier=TC_Mimoto_GetVerifierList_01 |
| Messages |
| Output Validation Exception |
|---|
org.testng.TestNGException:
Native Injection is NOT supported for @AfterSuite annotated testTearDown.
For more information on native dependency injection please refer to https://testng.org/#_dependency_injection
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:190)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:106)
... Removed 14 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetIssuerConfiguration_Mosip_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/Mosip/configuration, role=resident, templateFields=null, input={ }, output={ "name": "MosipVerifiableCredential" }, inputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfiguration, outputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with all valid parameters, uniqueIdentifier=TC_Mimoto_GetIssuerConfiguration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetIssuerConfiguration_With_Issuer_Removed_From_URL_Neg, endPoint=/v1/mimoto/issuers/configuration, role=resident, templateFields=null, input={ }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfiguration, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with invalid URL, uniqueIdentifier=TC_Mimoto_GetIssuerConfiguration_02 |
| Messages |